Virtual and augmented reality signatures
First Claim
1. A method implemented on a visual computing device to authenticate one or more users, the method comprising:
- using the visual computing device, receiving a first three-dimensional pattern from a first user;
sending the first three-dimensional pattern to a server computer;
at a time of user authentication, receiving a second three-dimensional pattern from the first user;
sending the second three-dimensional pattern to the server computer;
receiving an indication from the server computer as to whether the first three-dimensional pattern matches the second three-dimensional pattern within a margin of error;
when the first three-dimensional pattern matches the second three-dimensional pattern within the margin of error, authenticating the first user at the server computer;
when the first three-dimensional pattern does not match the second three-dimensional pattern within the margin of error, preventing authentication of the first user at the server computer;
receiving first additions to the first three-dimensional pattern from a second user;
modifying the first three-dimensional pattern based on the received first additions to create a third three-dimensional pattern; and
sending the third three-dimensional pattern to the server computer.
1 Assignment
0 Petitions
Accused Products
Abstract
A method implemented on a visual computing device to authenticate one or more users includes receiving a first three-dimensional pattern from a user. The first three-dimensional pattern is sent to a server computer. At a time of user authentication, a second three-dimensional pattern is received from the user. The second three-dimensional pattern is sent to the server computer. An indication is received from the server computer as to whether the first three-dimensional pattern matches the second three-dimensional pattern within a margin of error. When the first three-dimensional pattern matches the second three-dimensional pattern within the margin of error, the user is authenticated at the server computer. When the first three-dimensional pattern does not match the second three-dimensional pattern within the margin of error, user is prevented from being authenticated at the server computer.
23 Citations
13 Claims
-
1. A method implemented on a visual computing device to authenticate one or more users, the method comprising:
-
using the visual computing device, receiving a first three-dimensional pattern from a first user; sending the first three-dimensional pattern to a server computer; at a time of user authentication, receiving a second three-dimensional pattern from the first user; sending the second three-dimensional pattern to the server computer; receiving an indication from the server computer as to whether the first three-dimensional pattern matches the second three-dimensional pattern within a margin of error; when the first three-dimensional pattern matches the second three-dimensional pattern within the margin of error, authenticating the first user at the server computer; when the first three-dimensional pattern does not match the second three-dimensional pattern within the margin of error, preventing authentication of the first user at the server computer; receiving first additions to the first three-dimensional pattern from a second user; modifying the first three-dimensional pattern based on the received first additions to create a third three-dimensional pattern; and sending the third three-dimensional pattern to the server computer. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13)
-
Specification